First published: Thu Feb 16 2023(Updated: )
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAnalyzer may allow a remote unauthenticated attacker to perform a stored cross site scripting (XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.0.0<=6.0.11 | |
Fortinet FortiAnalyzer | >=6.2.0<=6.2.9 | |
Fortinet FortiAnalyzer | >=6.4.0<6.4.9 | |
Fortinet FortiAnalyzer | >=7.0.0<7.0.5 | |
Fortinet FortiAnalyzer | =7.2.0 | |
Fortinet FortiAnalyzer | =7.2.1 |
Please upgrade to FortiAnalyzer version 7.2.2 or above Please upgrade to FortiAnalyzer version 7.0.5 or above Please upgrade to FortiAnalyzer version 6.4.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30304.
The severity level of CVE-2022-30304 is medium.
CWE-79 refers to the improper neutralization of input during web page generation vulnerability.
FortiAnalyzer versions prior to 7.2.1, 7.0.4, and 6.4.8 are affected by CVE-2022-30304.
A remote unauthenticated attacker can exploit CVE-2022-30304 by performing a stored cross-site scripting (XSS) attack via the observed URL parameter in the FortiWeb attack event.